WikiLeaks' eyes have it with hi-tech hack attacks

Technology holds the secret to WikiLeaks, people hold the key to see digital theft protection

Will WikiLeaks work with tech firms to defeat CIA hacking ... - houstonchronicle.com

Advertisements

Household gadgets, home appliances, electronic devices, GPS systems and numerous additional items have made their way into mainstream settings, making life easier in some ways yet, also, riskier. The fact is, smart technology is a double-edged sword. Several components may jeopardize #privacy.

It may not be reasonable or feasible to respond to news about #Wikileaks with overkill: Going off the grid technologically.

Advertisements

If that is what holds appeal, that’s perfectly acceptable. In turn, however, doing so will impose limits that need not be self-inflicted. The average person is not likely in the scope of monitoring agencies.

Ramifications of WikiLeaks’ CIA Leaks

People may think “it” can happen to anyone. Yes, hacking does happen. But to be on the CIA’s (or additional agencies’) radar, individuals are earmarked by algorithms. If not harboring an intent to wreak havoc or cause harm to others, it significantly lowers the likelihood that Big Brother has taken a special interest.

A thought worthy of contemplation is: How is it that the WikiLeaks founder, Julian Assange, claims to have obtained the leaked CIA documents? As with previous so-called “leaks” published by WikiLeaks, it was someone in a trusted position who provided the data. That “trusted” individual has neither the time nor the means to steal from average people on a mass scale. All indicators point to it having been an inside job at the CIA.

The takeaway is that the majority of people have less cause for concern from CIA measures taken to eavesdrop than do people who have malicious intent toward mass amounts of people or governments.

This website uses profiling (non technical) cookies, also third parties cookies, in order to send advertising messages according to user's preferences. To know our policy or to deny the consent for cookies use click here. If you continue the navigation through accessing each element below or you close this banner you agree to the use of cookies